The contents of this chapter include all of the following: problem of intrusion, behavior and techniques; intrusion detection (statistical & rule-based); password management; various malicious programs; trapdoor, logic bomb, trojan horse, zombie; viruses; worms; distributed denial of service attacks. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 27 Review have considered: problem of intrusion, behavior and techniques intrusion detection (statistical & rule-based) password management Chapter 20 summary. Chapter 21 – Malicious Software Opening quote. Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though This chapter examines malicious software (malware), especially viruses and worms, which exploit vulnerabilities in computing systems. These have been given a lot of (often uninformed) comment in the general media. They are however, of serious concern, and are perhaps the most sophisticated types of threats to computer systems. We begin with a survey of various types of malware, with a more detailed look at the nature of viruses and worms. We then turn to distributed denial-of-service attacks. Malicious Software The terminology used for malicious software presents problems because of a lack of universal agreement on all terms and because of overlap. Stallings Table , and this diagram from 3/e, provide a useful taxonomy. It can be divided into two categories: those that need a host program (being a program fragment eg virus), and those that are independent programs (eg worm); alternatively you can also differentiate between those software threats that do not replicate (are activated by a trigger) and those that do (producing copies of themselves). Will now survey this range of malware. Malicious Software The terminology used for malicious software presents problems Because of a lack of universal agreement on all terms | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 27 Review have considered: problem of intrusion, behavior and techniques intrusion detection (statistical & rule-based) password management Chapter 20 summary. Chapter 21 – Malicious Software Opening quote. Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though This chapter examines malicious software (malware), especially viruses and worms, which exploit vulnerabilities in computing systems. These have been given a lot of (often uninformed) comment in the general media. They are however, of serious .